网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

How is UPSR and BLSR traffic rerouted during a protection switch when a complete fiber cable cut occurs?()

  • A、Traffic is switched from the first node receiving the AIS indication.
  • B、Traffic is switched from the far side of the failure, allowing handshaking to occur.
  • C、UPSR traffic is switched from the terminating node, BLSR traffic is rerouted from the originating node in the ring.
  • D、UPSR traffic is switched from the terminating node, circuit by circuit. BLSR traffic is rerouted from the last reachable node in the ring.

参考答案

更多 “How is UPSR and BLSR traffic rerouted during a protection switch when a complete fiber cable cut occurs?()A、Traffic is switched from the first node receiving the AIS indication.B、Traffic is switched from the far side of the failure, allowing handshaking to occur.C、UPSR traffic is switched from the terminating node, BLSR traffic is rerouted from the originating node in the ring.D、UPSR traffic is switched from the terminating node, circuit by circuit. BLSR traffic is rerouted from the last reachable node in the ring.” 相关考题
考题 He was in a traffic jam, ( ) made him late for school.A、thatB、whichC、whatD、how

考题 How many traffic classes are supported on the ERX Edge Router?() A.1B.2C.4D.8

考题 How does the PFE handle unicast transit traffic destined for an existing forwarding table entry?() A. It sends the traffic through one egress port toward its destinationB. It sends the traffic through multiple egress ports to all available receiversC. It sends the traffic through an internal link to the RED. It sends the traffic to the local system for further processing

考题 What are the contents of a scheduler?() A.A scheduler contains parameters that describe how a queue should be serviced.B.A scheduler contains traffic that is ready to be transmitted.C.A scheduler contains forwarding classes that allow traffic to be forwarded.D.A scheduler contains a map between the classification of a packet and its forwarding class.

考题 UPSR protection switching is initiated by (), while BLSR is initiated by (). A. the K1 SONET byte; the K2 SONET byteB. the K2 SONET byte;the K1 SONET byteC. transmitter switching;receiver detectionD. Line Overhead bytes;Path Overhead bytesE. Path Overhead bytes;Line Overhead bytes

考题 You are provisioning a DS-1 circuit on an ONS 15454 UPSR configuration and XC-10G card. How many total VT ports are used within the VT matrix at the source node?() A.0B.1C.2D.3E.4

考题 Why is an OC-3 2F-BLSR not feasible?() A. Switch times would exceed 50 ms for an OC-3 BLSR ring.B. An equal amount of working and protect bandwidth is required.C. DCC bandwidth is not large enough to handle K1/K2 processing.D. There is not enough bandwidth in an OC-3 ring to justify BLSR protection.

考题 Click the Exhibit button. A customer has several interconnected core rings (see exhibit). They want to create several irtual rings?utilizing their OC-192 backbone (nodes 1,2,3,4). What should you recommend?()A. PPMN with BLSR ringsB. PPMN with UPSR ringsC. 1:N protection on all core circuitsD. multi-ring interconnect with BLSR rings

考题 The following access list below was applied outbound on the E0 interface connected to the 192.169.1.8/29 LAN:How will the above access lists affect traffic?() A. FTP traffic from 192.169.1.22 will be denied.B. No traffic, except for FTP traffic will be allowed to exit E0.C. FTP traffic from 192.169.1.9 to any host will be denied.D. All traffic exiting E0 will be denied.E. All FTP traffic to network 192.169.1.9/29 will be denied.

考题 How will the above access lists affect traffic?() A.FTP traffic from 192.169.1.22 will be deniedB.No traffic, except for FTP traffic will be allowed to exit E0C.FTP traffic from 192.169.1.9 to any host will be deniedD.All traffic exiting E0 will be deniedE.All FTP traffic to network 192.169.1.9/29 will be denied

考题 36. We ___________ keep the new traffic law and learn how to protect ourselves.A.may.B.shouldC.canD.need

考题 UPSR protection switching is initiated by (), while BLSR is initiated by ().A、the K1 SONET byte; the K2 SONET byteB、the K2 SONET byte;the K1 SONET byteC、transmitter switching;receiver detectionD、Line Overhead bytes;Path Overhead bytesE、Path Overhead bytes;Line Overhead bytes

考题 How does the PFE handle unicast transit traffic destined for an existing forwarding table entry?()A、It sends the traffic through one egress port toward its destinationB、It sends the traffic through multiple egress ports to all available receiversC、It sends the traffic through an internal link to the RED、It sends the traffic to the local system for further processing

考题 A particular cell is expected to support 6 Erlangs of traffic at 1% Grade of Service. How many traffic channels are required?()A、6B、13C、3D、15E、22

考题 How will the above access lists affect traffic?()A、FTP traffic from 192.169.1.22 will be deniedB、No traffic, except for FTP traffic will be allowed to exit E0C、FTP traffic from 192.169.1.9 to any host will be deniedD、All traffic exiting E0 will be deniedE、All FTP traffic to network 192.169.1.9/29 will be denied

考题 You are provisioning a DS-1 circuit on an ONS 15454 UPSR configuration and XC-10G card. How many total VT ports are used within the VT matrix at the source node?()A、0B、1C、2D、3E、4

考题 How does a controller-based access point configured to operate in sniffer mode behave?()A、allows client traffic, captures data on all channelsB、allows client traffic, captures data on a single channelC、allows no client traffic, captures data on all channelsD、allows no client traffic, captures data on a single channel

考题 How can Cisco NetFlow be used to aid in the operation and troubleshooting of QoS issues? ()A、NetFlow can report on the number of traffic matches for each class map in a configured QoS policy configuration.B、NetFlow records can be used to understand traffic profiles per class of service for data, voice, and video traffic.C、NetFlow can discover the protocols in use and automatically adjust QoS traffic classes to meet policy-map requirements.D、NetFlow can be configured to identify voice and video traffic flows and place them into a low-latency queue for expedited processing.

考题 A customer indicates they run a mission-critical application which marks its packets best-effort (DSCP=0). How can you guarantee delivery of this traffic?()A、Remark the traffic on ingress and prioritize on egress.B、Enable CEF and Netflow. C、Configure the MS-Windows QoS Scheduler to prioritize this traffic.D、Enable WRED.

考题 How many traffic classes are supported on the ERX Edge Router?()A、1B、2C、4D、8

考题 What are the contents of a scheduler?()A、A scheduler contains parameters that describe how a queue should be serviced.B、A scheduler contains traffic that is ready to be transmitted.C、A scheduler contains forwarding classes that allow traffic to be forwarded.D、A scheduler contains a map between the classification of a packet and its forwarding class.

考题 单选题How many traffic classes are supported on the ERX Edge Router?()A 1B 2C 4D 8

考题 单选题How is SNCP and MS-SPRing traffic rerouted during a protection switch when a complete fiber cable cut occurs?()A  SNCP traffic is switched from the first node that recieves the AIS.  MS-SPRing traffic is rerouted from the first in the ring.B  SNCP traffic is selected at the destination node in the ring.  MS-SPRing is rerouted from the originating node in the ring.C  SNCP traffic is rerouted from the originating node in the ring. MS-SPRing traffic is rerouted from the originating node in the ring.D  SNCP traffic is selected at the destination node in the ring. MS-SPRing traffic is rerouted from the last reachable node in the ring.

考题 单选题How is UPSR and BLSR traffic rerouted during a protection switch when a complete fiber cable cut occurs?()A Traffic is switched from the first node receiving the AIS indication.B Traffic is switched from the far side of the failure, allowing handshaking to occur.C UPSR traffic is switched from the terminating node, BLSR traffic is rerouted from the originating node in the ring.D UPSR traffic is switched from the terminating node, circuit by circuit. BLSR traffic is rerouted from the last reachable node in the ring.

考题 单选题The following access list below was applied outbound on the E0 interface connected to the 192.169.1.8/29 LAN: access-list 135 deny tcp 192.169.1.8 0.0.0.7 eq 20 any access-list 135 deny tcp 192.169.1.8 0.0.0.7 eq 21 any How will the above access lists affect traffic? ()A FTP traffic from 192.169.1.22 will be deniedB No traffic, except for FTP traffic will be allowed to exit E0C FTP traffic from 192.169.1.9 to any host will be deniedD All traffic exiting E0 will be deniedE All FTP traffic to network 192.169.1.9/29 will be denied

考题 单选题Prior to applying SCREEN options to drop traffic, you want to determine how your configuration will affect traffic. Which mechanism would you configure to achieve this objective?()A the log option for the particular SCREEN optionB the permit option for the particular SCREEN optionC the SCREEN option, because it does not drop traffic by defaultD the alarm-without-drop option for the particular SCREEN option

考题 单选题UPSR protection switching is initiated by (), while BLSR is initiated by ().A the K1 SONET byte; the K2 SONET byteB the K2 SONET byte;the K1 SONET byteC transmitter switching;receiver detectionD Line Overhead bytes;Path Overhead bytesE Path Overhead bytes;Line Overhead bytes